Computer Forensics

Sources of Evidence Types of Evidence
  • Personal Computers Laptops
  • Tablets
  • Smart Phones
  • Servers
  • Thumb Drives
  • External Storage Drives
  • CD’s and DVD’s
  • Digital Cameras
  • Email
  • Documents & Spreadsheets
  • Photos & Video
  • Web Search & Browsing History
  • Text Messages
  • Calendars
  • Contacts
  • Instant Messaging Logs
  • Deleted Files
  • Encrypted Files

 

Most people would be amazed at the information that can be found on a computer. The items listed above are just a few examples of the types and sources of digital evidence that can be accessed with computer forensics. As society continues to develop and use new technologies, these lists will grow even longer.

“Wherever he steps, whatever he touches, whatever he leaves,
even unconsciously, will serve as a silent witness against him.”
Professor Edmond Locard (1877-1966)

Professor Locard believed that any time a person came in contact with an object, evidence of that contact was left behind. This came to be known as Locard’s Exchange Principle, and it helped change the way crime was investigated in the 20th century. When it comes to computers, this principle couldn’t be more relevant. There is almost nothing a person can do on a computer that doesn’t leave a trace.


Case Assistance

Case Assistance

Helios Data Forensics can assist you with all phases of your case Learn more about how Helios Data Forensics can help you with your case.

 Learn More

Methodology

Methodology

Computer forensics can be broken into four basic phases. Learn more about how the computer forensics process works.

 Learn More

Data Recovery

Is a hard drive or electronic device in your case damaged? Don’t let that hinder your case. Even physically damaged or failed drives can be resurrected to provide a forensically sound image of the data they contain.

 Learn More